adapter-audit

Use this skill to audit CLI adapter projects (like opencli) for missing output fields, then batch-generate fixes and submit PRs. Turns AI agents into adapter quality reviewers.

3,891 stars

Best use case

adapter-audit is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Use this skill to audit CLI adapter projects (like opencli) for missing output fields, then batch-generate fixes and submit PRs. Turns AI agents into adapter quality reviewers.

Teams using adapter-audit should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/adapter-audit/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/allens0104/adapter-audit/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/adapter-audit/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How adapter-audit Compares

Feature / Agentadapter-auditStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Use this skill to audit CLI adapter projects (like opencli) for missing output fields, then batch-generate fixes and submit PRs. Turns AI agents into adapter quality reviewers.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Adapter audit skill

Use this skill when you want to **systematically audit and fix CLI adapter projects** — for example, scanning all search adapters in opencli for missing `url` fields and batch-generating patches.

## When to use

- auditing adapter output schemas for missing fields (url, timestamp, thumbnail, etc.)
- generating batch fixes across many adapters at once
- preparing multi-file PRs to upstream projects
- maintaining output consistency across a large adapter registry

## Core workflow

### 1. Scan

Scan all adapters in the target project and classify each by:

- adapter type (YAML declarative vs TS/JS coded)
- which output fields are present
- which standard fields are missing

Standard fields to check:

- `url` — direct link to the content item
- `title` — content title
- `author` — creator/author name
- `timestamp` / `date` — publish or capture time

### 2. Classify fix type

For each missing field, determine the fix strategy:

| Situation | Fix strategy |
|-----------|-------------|
| Field is computed internally but not in `columns` | Add to `columns` list |
| Field is computed but stripped by a `map` step | Pass through the `map` step + add to `columns` |
| Field is not computed but can be constructed from existing data | Add construction logic + add to `columns` |
| Field requires external data not available in the API response | Skip or mark as "needs upstream API change" |

### 3. Fix

Apply fixes using the minimum change principle:

- For YAML adapters: add field to return object + map step + columns array
- For TS adapters: add field to return object + columns array
- Never change existing fields or behavior
- Only add new fields

### 4. Verify

After fixing, run the project's existing tests:

```bash
npm run build    # ensure TS compiles
npm test         # ensure nothing breaks
```

### 5. Submit

Create a single well-documented PR with:

- clear title describing the scope
- table showing before/after coverage
- per-adapter fix type classification
- risk assessment (should always be "additive only")

## Proven example

This skill was used to audit opencli's 33 search adapters:

- **Before**: 22/33 (67%) had `url` in output
- **After**: 32/33 (97%) had `url` in output
- **Fix types used**: columns-only (3), map-passthrough (2), construct-from-data (4)
- **Files changed**: 9
- **Lines changed**: +17 / -10
- **PR**: merged within hours, all CI green

## Output contract

The audit output should include:

1. total adapters scanned
2. per-adapter field coverage table
3. fix strategy for each missing field
4. list of files changed
5. before/after coverage metrics
6. risk classification

## Key rules

- Never modify existing output fields — only add missing ones
- Prefer constructing URLs from existing API data over adding new API calls
- Skip fields that genuinely don't apply (e.g., `url` for dictionary word lookup)
- Always verify the constructed URL format is correct for the platform
- Group all fixes into a single PR for easier review

## Quick invocation template

```text
Use /adapter-audit to scan all search adapters in this CLI project for missing url fields, fix them, and prepare a PR.
```

```text
请用 /adapter-audit 扫描这个 CLI 项目里所有 search adapter 的缺失字段,批量修复并准备 PR。
```

Related Skills

Payroll Compliance Auditor

3891
from openclaw/skills

Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.

Payroll & HR Compliance

Energy Audit — Commercial Building Assessment

3891
from openclaw/skills

Run a full energy audit for commercial or industrial facilities. Identifies waste, models savings, and generates a prioritized retrofit roadmap with ROI timelines.

Sustainability & Efficiency

Compliance & Audit Readiness Engine

3891
from openclaw/skills

Your AI compliance officer. Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS — from zero to audit-ready. No consultants needed.

Security

Compliance Audit Generator

3891
from openclaw/skills

Run internal compliance audits against major frameworks without hiring a consultant.

Security

Cloud Cost Optimization Audit

3891
from openclaw/skills

Analyze cloud infrastructure spend across AWS, Azure, and GCP. Identify waste, rightsizing opportunities, and reserved instance savings.

AI Spend Audit

3891
from openclaw/skills

Audit your company's AI spending — find waste, measure ROI, and right-size your tool stack.

AI Safety Audit

3891
from openclaw/skills

Comprehensive AI safety and alignment audit framework for businesses deploying AI agents. Built around the UK AI Security Institute Alignment Project standards (2026), EU AI Act requirements, and NIST AI RMF.

Security

SX-security-audit

3891
from openclaw/skills

全方位安全审计技能。检查文件权限、环境变量、依赖漏洞、配置文件、网络端口、Git 安全、Shell 安全、macOS 安全、密钥检测等。支持 CLI 参数、JSON 输出、配置文件。当用户要求"安全检查"、"漏洞扫描"、"权限检查"、"安全审计"时使用此技能。

Security

Skill Audit 🔍

3891
from openclaw/skills

扫描 OpenClaw skills 中的安全风险,防止供应链攻击。

Security

jobaudit

3891
from openclaw/skills

Audit your OpenClaw cron job history and estimate how much you've spent on AI agents this week.

writing-credibility-auditor

3891
from openclaw/skills

Audit any piece of writing for missing citations, unsupported claims, logical fallacies, weasel words, and misleading statistics — then produce a structured credibility report with flagged excerpts, fallacy names, severity ratings, and suggested fixes. Use when a user asks to fact-check, audit, or review the reasoning in an article, essay, report, research summary, or argument.

trade-audit

3891
from openclaw/skills

Mandatory audit gate for all trading and transfer decisions. Sends agent-prepared decision material to Apus deterministic inference on an NVIDIA H100 TEE and returns an attested APPROVE / REJECT / WAIT verdict. Any skill or agent that executes a buy, sell, swap, transfer, or liquidity action MUST pass through trade-audit first.